RecruitingBlogscom

Follow Us:

 

audi

Results 351 - 375 of 1014Sort Results By: Published Date | Title | Company Name
Published By: Jebbit     Published Date: Jun 12, 2018
How can you strike the right balance? It’s paradoxical...and annoying. Our consumers want personalized, tailored experiences, but they hold their data cards close to the chest. After Cambridge Analytica, data breaches, and creepy advertising practices, the only way forward is to build (and maintain) trust with your audience. Download this new report to learn: How did we get here? With so much data at our fingertips, what went wrong? How do consumers feel about personalization in 2018? How to get ahead and stay ahead. What data to keep, and what to throw out.
Tags : 
privacy, paradox, consumer, data, marketers
    
Jebbit
Published By: Jebbit     Published Date: Jun 12, 2018
In the retail and eCommerce world, data can be your differentiator...or your downfall. To stand out, marketers are increasingly turning to first-party declared data to fuel their strategies. Learn how retailers are using mobile attention to collect and activate declared data for: Qualified lead acquisition and direct response Relevant remarketing with custom audiences and retargeting 1-to-1 email personalization Audience building and profiling
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Domo APAC     Published Date: Mar 04, 2019
Cisco’s marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Cisco’s marketing team plaudits and several industry awards View Domo’s privacy policy
Tags : 
    
Domo APAC
Published By: AppZen     Published Date: Jun 17, 2019
Modern finance teams are embracing AI to audit their invoice-based spend. With AI, they can review all of their invoices prior to payment to spot errors, fraud, and contract violations. AppZen customers have identified 16 critical invoice audit and contract compliance use cases that only AI can make possible.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jun 17, 2019
On average, enterprises processed over 200,000 spend transactions last quarter. Finance teams that use artificial intelligence in their spend audit reviewed 100 percent of transactions, versus 2-10 percent of expense reports and 5-10 percent of invoices for teams that didn’t.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Comply with regulations like FCPA - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Reimburse employees same-day - Make sure expenses and invoices comply with policy - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Eliminate fraud and waste - Streamline process
Tags : 
    
AppZen
Published By: AppZen     Published Date: Aug 07, 2019
On average, enterprises processed over 200,000 spend transactions last quarter. Finance teams that use artificial intelligence in their spend audit reviewed 100 percent of transactions, versus 2-10 percent of expense reports and 5-10 percent of invoices for teams that didn’t.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Aug 07, 2019
On average, enterprises processed over 200,000 spend transactions last quarter. Finance teams that use artificial intelligence in their spend audit reviewed 100 percent of transactions, versus 2-10 percent of expense reports and 5-10 percent of invoices for teams that didn’t.
Tags : 
    
AppZen
Published By: Pure Storage     Published Date: Feb 02, 2017
In this white paper, we’ll be providing a quick lesson in cloud economics, based on an ESG audit of a model that compares the monthly cost of public cloud infrastructure with the monthly cost of leasing a converged private cloud.
Tags : 
cloud, cloud applications, cloud infrastructure, private cloud
    
Pure Storage
Published By: Riverbed     Published Date: Feb 26, 2015
In the world of network management, knowledge is power. But many organizations know a lot less about their network than they think. With proper network auditing and configuration, businesses can fill this knowledge gap.
Tags : 
network management, network auditing, automation, key network management processes, audit, network infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : 
pci compliance, auditing, data security, cardholder data, security standards, security measures, security, data management
    
Riverbed
Published By: Riverbed     Published Date: Apr 24, 2015
A brief on how to use network auditing and configuration with the maximum of efficiency and utility.
Tags : 
networking, api, applications, management, visualizing, best practices, monitoring, auditing
    
Riverbed
Published By: UL     Published Date: Oct 22, 2018
CERTIFICATION IMPACT ANALYSIS: IEC 62368-1, EDITION No. 3 Audio/Video, Information and Communication Technology Equipment – Part 1: Safety Requirements.
Tags : 
audio, video, communication, technology, safety requirements, iec 62368-1, 62368-1 edition 3
    
UL
Published By: UL     Published Date: Nov 14, 2018
Dieses Dokument dient der Untersuchung der Auswirkungen von Änderungen, die sich durch die neue Ausgabe (Nr. 3) der IEC- und UL-Normen für Audio-/Video-, Informations- und Kommunikationstechnologie – Teil 1: Sicherheitstechnische Anforderungen gegenüber deren Vorgängerversionen, IEC 62368-1, Ausgabe Nr. 2 und UL 62368-1, Ausgabe Nr. 2 ergeben. Die Veröffentlichung von Ausgabe Nr. 3 der IEC 62368-1 ist für das 3. Quartal 2018 geplant.
Tags : 
    
UL
Published By: UL     Published Date: Nov 15, 2018
La presente analisi è volta a identificare e ad analizzare l'impatto delle differenze sostanziali tra l'ultima Edizione n. 3 delle norme IEC e UL per le Apparecchiature per le tecnologie audio/video, di informazione e di comunicazione – Parte 1: Requisiti di sicurezza, e le relative versioni precedenti, IEC 62368-1, Edizione n. 2 e UL 62368-1, Edizione n. 2.
Tags : 
    
UL
Published By: Return Path     Published Date: Jan 29, 2013
The need for marketers to improve their optimization practices has led Return Path and the Relevancy Group to explore the state of email marketing measurement and analysis, as well as its role and impact on marketing performance.
Tags : 
email marketing optimization practices, audience segmentation, inbox placement, email program results, email marketing performance, competitive benchmarking tools, competitor email programs, advertising agencies
    
Return Path
Published By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : 
heat, data center, heat monitoring, hardware, datacenter, mission critical
    
HP
Published By: Motorola     Published Date: Apr 08, 2010
MOTOTRBO, a digital communications system with repeaters that are linked via Internet Protocol (IP). Leveraging the existing Internet infrastructure provided an economical way for Georgia Nut Company to meet their communication needs for today and tomorrow.
Tags : 
motorola, mototrbo, digital communications system, repeaters, internet protocol, audio in noisy environment, voice and data communication
    
Motorola
Published By: Motorola     Published Date: May 05, 2010
Digital radio seemed to be the best route for NASCAR to achieve the key requirements surfaced in this study, which included their need to coordinate large numbers of radios, ensure absolute audio clarity, maintain consistent, reliable communications and have a radio that was durable enough to withstand a rough environment.
Tags : 
motorola mototrbo, communication system, digital radio, two-way radio, voice clarity, audio
    
Motorola
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate
    
Entrust Datacard
Published By: Marketo     Published Date: Jun 26, 2015
In this comprehensive, 150+ page guide, we cover topics from creating a cross-channel mobile marketing strategy, to marketing via SMS and MMS, to creating a mobile app. Loaded with checklists, charts, and thought leadership from mobile marketing experts, The Definitive Guide to Mobile Marketing will teach you how to create a strategic mobile marketing plan and engage your audience effectively via mobile devices.
Tags : 
marketing, mobile, strategic, responsive design, measurement, optimization
    
Marketo
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top